Hadi BahadoriJune 13, 2024 EducationalHow to secure and monitor Kafka 360 views15 minute read Introduction Apache Kafka supports various security protocols and authentication workflows to ensure… 0 Shares 0 0 0
Hadi BahadoriMarch 30, 2024 EducationalSSH to AWS EC2 from PuTTY on Windows 354 views1 minute read Introduction In this article, I will explain how to create an SSH connection to an AWS EC2 instance from PuTTY on Windows. 0 Shares 0 0 0
Hadi BahadoriFebruary 23, 2024 EducationalHow to securely route web traffic without a VPN using a SOCKS tunnel 519 views11 minute read Introduction At times, you may find yourself on a network that is insecure or has a very… 0 Shares 0 0 0
Hadi BahadoriFebruary 4, 2024 EducationalHow to list and delete Iptables firewall rules 452 views8 minute read Introduction Iptables is a firewall that plays a fundamental role in network security for most Linux systems. 0 Shares 0 0 0
Hadi BahadoriJanuary 18, 2024 EducationalProtecting game servers against DDos 622 views6 minute read Introduction This tutorial will show you how to protect your game server from DDoS attacks by setting up a… 0 Shares 0 0 0
adminDecember 19, 2023 FirewallHow to block BitTorrent traffic with IPtables 586 views3 minute read IPTABLES is a user-space application that allows the system administrator to configure the tables provided… 0 Shares 0 0 0
adminDecember 13, 2023 SecurityHow to change Windows Server and VPS password? 372 views3 minute read In this tutorial, we will show you how to change the Administrator password in Windows Server 2008 R2 or 2012 R2. 0 Shares 0 0 0
adminDecember 13, 2023 SecurityFind the IP of a site protected with Cloudflare 770 views2 minute read Finding the IP of a site protected by Cloudflare was defined and explained in previous articles… 0 Shares 0 0 0
adminDecember 12, 2023 SecurityHow to change root password via rescue system (Linux)? 594 views2 minute read How to change the root password via the rescue system (Linux)? If your root password… 0 Shares 0 0 0